Wireless Network Security

Running head: Wireless Network Security

Wireless Network Security

Abstract

This research presents the current and future wireless telecommunication. More importantly, wireless data communication. Also I explore the key technologies and fundamental elements of current network security. I briefly discussed related wireless network models, namely ad hoc networks and a number of short range wireless local area networks.

Wireless Network Security

Introduction

Wireless networking technology, once confined to the realm of high technology, is growing more and more prevalent. Irvine, Broadcom Corporation says, that the 802.11 wireless network standard, and it’s extensions in the form of 802.11b, a, g and pre-n, are now not only included in desktop and notebook computers, but is included in most smart phones and PDAs, as well as more rudimentary consumer devices such as thermostats (p. 9).

An increased reliance on wireless networking creates an increased need for effective wireless security. Bangeman, (2002) in his research says:

Techniques such as Wired Equivalent Privacy, or WEP, are easy to support and implement but have been shown to be trivial to circumvent through widely available techniques The newer Wi-Fi Protected Access, or WPA, and its extension WPA2 have shown themselves to be much more secure than WEP, but are unsupported by many early 802.11 devices. (p. 1).

More traditional means of security are also commonly employed with wireless networking. Minimizing the range of a wireless network past its range of use is helpful in minimizing unintended access, as is only allowing devices that have been specifically authorized. As with all security, one must take care to balance ease of use and convenience with preventing unauthorized access or use. This paper will look at the most common types of wireless network security, as well as the relative level of support and steps involved in implementation.

   

   

Wireless networks

Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the Internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range, according to NIST, (2005):

Wireless Wide Area Networks (WWAN), WLANs, and Wireless Personal Area Networks (WPAN). WWAN includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), LMDS, MMDS and Mobitex. WLAN, representing wireless local area networks, includes 802.11, HiperLAN, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and IR. All of these technologies are “tetherless”—they receive and transmit information using electromagnetic (EM) waves. Wireless technologies use wavelengths ranging from the radio frequency (RF) band up to and above the IR band.  The frequencies in the RF band cover a significant portion of the EM radiation spectrum, extending from 9 kilohertz (kHz), the lowest allocated wireless communications frequency, to thousands of gigahertz (GHz). As the frequency is increased beyond the RF spectrum, EM energy moves into the IR and then the visible spectrum. (p. 17).

Wireless LAN`s (Infrastructure Mode)

In addition, NIST, (2005) says, WLANs allow greater flexibility and portability than do traditional wired local area networks (LAN). Unlike a traditional LAN, which requires a wire to connect a user’s computer to the network, a WLAN connects computers and other components to the network using an access point device. An access point communicates with devices equipped with wireless network adaptors; it connects to a wired Ethernet LAN via an RJ-45 port. Access point devices typically have coverage areas of up to 300 feet (approximately 100 meters). This coverage area is called a cell or range. Users move freely within the cell with their laptop or other network device. Access point cells can be linked together to allow users to even “roam” within a building or between buildings. (p. 18).

Ad Hoc Network`s

On Ad hoc networks, such as Bluetooth, NIST, (2005), quotes, there are networks designed to dynamically connect remote devices such as cell phones, laptops, and PDAs. These networks are termed “ad hoc” because of their shifting network topologies. Whereas WLANs use a fixed network infrastructure, ad hoc networks maintain random network configurations, relying on a master-slave system connected by wireless links to enable devices to communicate. In a Bluetooth network, the master of the piconet controls the changing network topologies of these networks. It also controls the flow of data between devices that are capable of supporting direct links to each other. As devices move about in an unpredictable fashion, these networks must be reconfigured on the fly to handle the dynamic topology. The routing that protocol Bluetooth employs allows the master to establish and maintain these shifting networks. (p. 19).

WLAN Components

A WLAN comprises two types of equipment: a wireless station and an access point. A station, or client, is typically a laptop or notebook personal computer (PC) with a wireless NIC. A WLAN client may also be a desktop or handheld device (e.g., PDA, or custom device such as a barcode scanner) or equipment within a kiosk on a manufacturing floor or other publicly accessed area. Wireless laptops and notebooks—“wireless enabled”—are identical to laptops and notebooks except that they use wireless NICs to connect to access points in the network. The wireless NIC is commonly inserted in the client's Personal Computer Memory Card International Association (PCMCIA) slot or Universal Serial Bus (USB) port. The NICs use radio signals to establish connections to the WLAN. The AP, which acts as a bridge between the wireless and wired networks, typically comprises a radio, a wired network interface such as 802.3, and bridging software. The AP functions as a base station for the wireless network, aggregating multiple wireless stations onto the wired network.

The 802.11 Wireless Networking Standards, Protocols

At the lowest level, computer networking is made up of pieces of data, known as packets. Each packet contains a header stating its destination, the type of data it contains, with the remainder of the packet occupied by the actual data that is being transmitted. Wireless networking operates by the same concept, transmitting packets between two devices. Though the concept is simple, many different ways to accomplish it were created, with different solutions almost always being incompatible.

After many years of various vendor specific solutions, the Institute of Electrical and Electronics Engineers, or the IEEE, began to look into creating a unified standard for wireless networking in the mid-1990s. IEEE created the 802.11 specification, which describes how wireless short-range communications should be carried out over the 2.4 ghz, 3.4ghz, and 5ghz frequencies. The maximum supported data rate described by 802.11 is 2 megabits/second. The specification failed to become widely adopted, and is now unsupported.

The first widely adopted amendment to 802.11 was 802.11b. 802.11b was completed in 1999 and amended in 2001, and is still commonly used and supported thanks to the backwards compatibility of future amendments to the 802.11 specification. 802.11b added to the standard with two higher speeds (5.5 Mbps and 11Mbps) and uses ISM band.

The 802.11 standard can support wireless devices that are up to 115 meters apart. However, devices that are that far apart might not be transmitting at 11 Mbps. Radio waves decrease in power over distance, much like the sound of our voice. Instead of completely dropping signal if it falls out of range to transmit at 11Mbps, the 802.11b standard specifies that the devices should drop their transmission speed to the next lower level (5.5, 2 or 1). This allows devices to transmit farther apart but at slower speed.

Join now!

802.11b devices suffer interference from other products operating in the 2.4 GHz band. (Devices operating in the 2.4 GHz range include: microwave ovens, Bluetooth devices, baby monitors and cordless telephones). It also uses three different non overlapping channels (1, 6, 11) to minimize the interference between each of the access points and the mobile devices associated with those access points.

At the same time the IEEE created the 802.11b standard, it also issued another standard with even higher speeds. The 802.11a standard specifies a maximum rated speed of 54Mbps and also supports 48, 36, 24, 12, 9 and 6Mbps transmission ...

This is a preview of the whole essay